[15737] in bugtraq

home help back first fref pref prev next nref lref last post

Re: CERT Advisory CA-2000-69

daemon@ATHENA.MIT.EDU (CERT Coordination Center)
Wed Jul 12 12:13:27 2000

MIME-Version: 1.0
Content-Type: text/plain; charset=us-ascii; format=flowed
Content-Transfer-Encoding: 7bit
Content-Disposition: inline
Message-ID:  <505734.3172313137@centerfield.blue.cert.org>
Date:         Tue, 11 Jul 2000 14:05:37 -0400
Reply-To: CERT Coordination Center <cert@cert.org>
From: CERT Coordination Center <cert@cert.org>
X-To:         jamie@next.hway.net, nanog@merit.edu
To: BUGTRAQ@SECURITYFOCUS.COM
In-Reply-To:  <20000710160016.A24976@next.hway.net>

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

This is, of course, a forgery but nonetheless pretty amusing. However, the
state of the art in forged CERT advisories remains the Independence Day
Advisory (as in the movie starring Will Smith) from a few years ago, which
described a vulnerability in the "NiftyGreenShield" subsystem of "AlienOS."
All CERT advisories are signed with our PGP key.

The CERT/CC is not aware of any vulnerabilities in currently-shipping
products from Sony. ;-)

Thanks,
Shawn

Shawn Hernan
svh@cert.org
Vulnerability Handling Team Leader
CERT Coordination Center

- - --On Monday, July 10, 2000 4:00 PM -0400 jamie@next.hway.net wrote:

> CERT Advisory CA-2000-69 AIBO Authentication Algorithm Corruption
> Vulnerability
>
>    Original Release Date: July 10, 2000
>    Last Revised: --
>    Source: CERT/CC
>
>    A complete revision history is at the end of this file.
>
> Systems affected
>
>    * AIBO ERS-110 Aperios OS
>    * AIBO ERS-111 Aperios OS
>

-----BEGIN PGP SIGNATURE-----
Version: PGPfreeware 6.5.2 for non-commercial use <http://www.pgp.com>

iQA/AwUBOWthz1r9kb5qlZHQEQLBlwCgr36m/q9QYzH91lC8EzHRuUtcr/EAn3yX
RujCJWQx2dc4Oh8A9KUJ6XB7
=6xHC
-----END PGP SIGNATURE-----

home help back first fref pref prev next nref lref last post